SSH Manager for Machines
Prevent misuse, compromise, and key sprawl with new authorization and policy controls

Don’t let your SSH keys become a security liability.
Ineffective tracking of SSH machine identities leads to key sprawl, lost keys, missing security controls and slow incident response—all increasing the risk of unauthorized access to your mission-critical systems.
CyberArk SSH Manager for Machines helps organizations track and organize the vast number of SSH keys in use, while new authorization and policy controls deliver real-time authorization tracking, centralized visibility, risk reduction, and audit compliance.
Manage the complete SSH machine identity lifecycle
Gain real-time visibility into which keys are being used where, by whom, and when — and apply new policy controls to simplify rotation and strengthen audit compliance.
Maintain visibility and control of thousands or millions of SSH keys
Discover SSH host and authorized keys throughout your organization and maintain an up-to-date, actionable inventory.
Make quick, policy-compliant work of batch remediation and replacement
Revoke and rotate SSH keys in bulk, without any hassle, through comprehensive automation and policy enforcement.
Discover, inventory and map all SSH key pairs.
- Establish a clear overview of keys and their trusted relationships, including users, hosts and configurations.
- Log when any keys are used, the time used and who used them.
- Take advantage of flexible reporting capabilities for simplified auditing workflows.


Define SSH use policies and coordinate the full SSH lifecycle.
- Map policy violations to NIST 800-53 with ease.
- Automate the full SSH machine identity lifecycle to maintain InfoSec oversight and control.
- Complete audits on time and on budget to eliminate potential fines.
Prevent unauthorized access with a fast, automated service that scales to control millions of SSH keys.
- Mitigate high-priority threat exposure by quickly updating keys in bulk.
- Generate and rotate SSH keys with a single click.
- Work within a highly secure, highly available platform.


Work with SSH Manager for Machines in the way that works best for you.
- Quickly and easily adopt SSH keys and certificates through integrations with multiple configuration solutions.
- Transition to SSH certificates with the built-in CA or multiple CAs of your choice with defined issuance restrictions.
- Use your operating system of choice or take advantage of software development kits for Go, Python and Java.